Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

CowboyRobot writes "Despite the headlines, the big denial of service attack may not have slowed the Internet after all. The argument against the original claim include the fact that reports of Internet users seeing slowdowns came not from service providers, but the DDoS mitigation service CloudFlare, which signed up Spamhaus as a customer last week. Also, multiple service providers and Internet watchers have now publicly stated that while the DDoS attacks against Spamhaus could theoretically have led to slowdowns, they've seen no evidence that this occurred for general Internet users. And while some users may have noticed a slowdown, the undersea cable cuts discovered by Egyptian sailors had more of an impact than the DDoS."

moon_unit2 writes "Tech Review has a story about a garage in Ingolstadt, Germany, where the cars park themselves. The garage is an experiment set up by Audi to explore ways that autonomous technology might practically be introduced; most of the sensor technology is built into the garage and relayed to the cars rather than inside the cars themselves. It seems that carmakers see the technology progressing in a slightly different way to Google, with its fleet of self-driving Prius. From the piece: 'It's actually going to take a while before you get a really, fully autonomous car,' says Annie Lien, a senior engineer at the Electronics Research Lab, a shared facility for Audi, Volkswagen, and other Volkswagen Group brands in Belmont, California, near Silicon Valley. 'People are surprised when I tell them that you're not going to get a car that drives you from A to B, or door to door, in the next 10 years.'"

JavaRob (28971) writes "From the WordPress development blog: "If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately."

Fortunately, they got a tipoff, but it's not clear how long the altered download (the cracker altered a couple of files to add in remote execution capabilities) would have stayed up otherwise.

Note: the cracker did not sneak in code by posing as an OSS developer (the common FUD scare scenario...); they just managed to crack one of the site's servers, and altered the download directly.